• Title/Summary/Keyword: Innovation Techniques

Search Result 307, Processing Time 0.028 seconds

A Study on the Smart Tourism Awareness through Bigdata Analysis

  • LEE, Song-Yi;LEE, Hwan-Soo
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.5
    • /
    • pp.45-52
    • /
    • 2020
  • Purpose: In the 4th industrial revolution, services that incorporate various smart technologies in the tourism sector have begun to gain popularity. Accordingly, academic discussions on smart tourism have also started to become active in various fields. Despite recent research, the definition of smart tourism is still ambiguous, and it is not easy to differentiate its scope or characteristics from traditional tourism concepts. Thus, this study aims to analyze the perception of smart tourism exposed online to identify the current point of smart tourism in Korea and present the research direction for conceptualizing smart tourism suitable for the domestic situation. Research design, data, and methodology: This study analyzes the perception of smart tourism exposed online based on 20,198 news data from portal sites over the past six years. Data on words used with smart tourism were collected from the leading portal sites Naver, Daum, and Google. Text mining techniques were applied to identify the social awareness status of smart tourism. Network analysis was used to visualize the results between words related to smart tourism, and CONCOR analysis was conducted to derive clusters formed by words having similarity. Results: As a result of keyword analysis, the frequency of words related to the development and construction of smart tourism areas was high. The analysis of the centrality of the connection between words showed that the frequency of keywords was similar, and that the words "smartphones" and "China" had relatively high connection centrality. The results of network analysis and CONCOR indicated that words were formed into eight groups including related technologies, promotion, globalization, service introduction, innovation, regional society, activation, and utilization guide. The overall results of data analysis showed that the development of smart tourism cities was a noticeable issue. Conclusions: This study is meaningful in that it clearly reflects the differences in the perception of smart tourism between online and research trends despite various efforts to develop smart tourism in Korea. In addition, this study highlights the need to understand smart tourism concepts and enhance academic discussions. It is expected that such academic discussions will contribute to improving the competitiveness of smart tourism research in Korea.

Enhanced Secure Sensor Association and Key Management in Wireless Body Area Networks

  • Shen, Jian;Tan, Haowen;Moh, Sangman;Chung, Ilyong;Liu, Qi;Sun, Xingming
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.453-462
    • /
    • 2015
  • Body area networks (BANs) have emerged as an enabling technique for e-healthcare systems, which can be used to continuously and remotely monitor patients' health. In BANs, the data of a patient's vital body functions and movements can be collected by small wearable or implantable sensors and sent using shortrange wireless communication techniques. Due to the shared wireless medium between the sensors in BANs, it may be possible to have malicious attacks on e-healthcare systems. The security and privacy issues of BANs are becoming more and more important. To provide secure and correct association of a group of sensors with a patient and satisfy the requirements of data confidentiality and integrity in BANs, we propose a novel enhanced secure sensor association and key management protocol based on elliptic curve cryptography and hash chains. The authentication procedure and group key generation are very simple and efficient. Therefore, our protocol can be easily implemented in the power and resource constrained sensor nodes in BANs. From a comparison of results, furthermore, we can conclude that the proposed protocol dramatically reduces the computation and communication cost for the authentication and key derivation compared with previous protocols. We believe that our protocol is attractive in the application of BANs.

A Empirical Study on the influence of ISO 9001 QMS to Management Performance (융·복합 시대의 ISO 9001 품질경영시스템이 경영성과에 미치는 영향에 관한 실증적 연구)

  • Lee, Sun-Kyu;Kang, Jong-Goo;Choi, Byung-Chul;Kang, Eun-Gu
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.181-191
    • /
    • 2016
  • The purpose of this study is to analyze the management performance of the companies in the auto parts production requirements of new management techniques ISO9001 quality management system requirements for management innovation perspective in convergence age. For this purpose, we conducted a survey visiting the auto parts manufacturers. The results were as follows. First, among the details of the four key requirements of the ISO 9001 quality management systems in small and medium component suppliers, managers and responsible resource management showed a positive impact on business performance. In addition, based on the results of the investigation of the differences by grade, the higher rank group executive responsibilities, sub-grade group showed a low awareness of the quality management according to ISO 9001. This will contribute to establishing the guidelines and Improvement Consulting Strategies to improve productivity in small and medium automotive rubber bellows automotive parts production.

Topic Analysis Using Big Data Related to 'Blockchain usage': Focused on Newspaper Articles ('블록체인 활용' 관련 빅데이터를 활용한 토픽 분석: 신문기사를 중심으로)

  • Kim, Sungae;Jun, Soojin
    • Journal of Industrial Convergence
    • /
    • v.18 no.1
    • /
    • pp.73-78
    • /
    • 2020
  • To analyze the main topics related to the use of blockchain technology, the Topic Modeling Technique was applied to the 'Blockchain Technology Utilization' big data shown in newspaper articles. To this end, from 2013 to 2019, when newspaper articles on the use of blockchain technology first appeared, the topics were extracted from 21 newspapers and analyzed by time to 15,537 articles. As a result of the analysis, articles related to the utilization of blockchain technology have increased exponentially since 2015 and focused on IT_science and economics. Key words related to cryptocurrency, bitcoin and virtual currency were weighted high, although they differed depending on time. Blockchain technology, which had focused on financial transactions, gradually expanded to big data, Internet of Things and artificial intelligence. As a result, changes in corporate topics were also made together to expand into various fields at banks for financial transactions, focusing on large and global companies. The study showed how these topics were changing, along with the main topics in newspaper articles related to the use of blockchain technology.

The Implementation of Sustainable Manufacturing Practice in Textile Industry: An Indonesian Perspective

  • MUHARDI, Muhardi;CINTYAWATI, Cici;ADWIYAH, Rabiatul;HAMI, Norsiah;HASHIM, Rushanim;OMAR, Salmah;SHAFIE, Shafini Mohd
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.1041-1047
    • /
    • 2020
  • The intention of this paper is to give a better understanding about the implementation of sustainable manufacturing practice in the textile companies in Indonesia as one of the promising sectors in the manufacturing industry. The data was collected by taking a case study approach in one of the leading textile companies in Indonesia. Questionnaire and interview techniques were used to gather in-depth information about the implementation of a sustainable concept in the company. The result reveals that the extent of the implementation of Sustainable Manufacturing Practices (SMP) in the companies are at a level of moderate to high. From the three dimensions measured which are environment, economy, and social dimensions, the evaluation result shows good performance in terms of the implementation of sustainable concepts, like low level of gas emission, high percentage of renewable energy usage, cost reduction rate, high quality of life, etc. From this result, the authors then develop a sustainable manufacturing model in the wider coverage to be implemented not only in the textile industry but is expected to be implemented in manufacturing sectors as well. This model consists of at least seven basic archetypes which are divided into three dominant areas: technological innovation, economical, and social areas which aim to bring better performance in the manufacturing industry of Indonesia.

For Improving Security Log Big Data Analysis Efficiency, A Firewall Log Data Standard Format Proposed (보안로그 빅데이터 분석 효율성 향상을 위한 방화벽 로그 데이터 표준 포맷 제안)

  • Bae, Chun-sock;Goh, Sung-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.157-167
    • /
    • 2020
  • The big data and artificial intelligence technology, which has provided the foundation for the recent 4th industrial revolution, has become a major driving force in business innovation across industries. In the field of information security, we are trying to develop and improve an intelligent security system by applying these techniques to large-scale log data, which has been difficult to find effective utilization methods before. The quality of security log big data, which is the basis of information security AI learning, is an important input factor that determines the performance of intelligent security system. However, the difference and complexity of log data by various product has a problem that requires excessive time and effort in preprocessing big data with poor data quality. In this study, we research and analyze the cases related to log data collection of various firewall. By proposing firewall log data collection format standard, we hope to contribute to the development of intelligent security systems based on security log big data.

Implementation of Secure Keypads based on Tetris-Form Protection for Touch Position in the Fintech (핀테크에서 터치 위치 차단을 위한 테트리스 모양의 보안 키패드의 구현)

  • Mun, Hyung-Jin;Kang, Sin-Young;Shin, ChwaCheol
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.144-151
    • /
    • 2020
  • User-authentication process is necessary in Fintech Service. Especially, authentication on smartphones are carried out through PIN which is inputted through virtual keypads on touch screen. Attacker can analogize password by watching touched letter and position over the shoulder or using high definition cameras. To prevent password spill, various research of virtual keypad techniques are ongoing. It is hard to design secure keypad which assures safety by fluctuative keypad and enhance convenience at once. Also, to reconfirm user whether password is wrongly pressed, the inputted information is shown on screen. This makes the password easily exposed through high definition cameras or Google Class during recording. This research analyzed QWERTY based secure keypad's merits and demerits. And through these features, creating Tetris shaped keypad and piece them together on Android environment, and showing inputted words as Tetris shape to users through smart-screen is suggested for the ways to prevent password spill by recording.

The Theory of Change in Nursing Practice

  • Gas, Du
    • Journal of Korean Academy of Nursing
    • /
    • v.9 no.2
    • /
    • pp.1-6
    • /
    • 1979
  • The topic I have chosen for presentation to you today is entitled, the theory of change in nursing practice or to put it into simpler words. How do new ideas in nursing get started - Where do they come from\ulcorner - How are these ideas spread through the social system of nurses\ulcorner - What makes some Directors of Nursing more ready to accept change than others\ulcorner What factors in-fluence than to introduce change\ulcorner The process of change has been the subject of considerable research in such diverse disciplines and fields as anthropology and rural sociology, marketing and, also, education, for many years. The studies are called“diffusion”studies, or sometimes“adoption”studies, or“adoption of innovation”studies. They deal specifically with the transmission of innovations to members of a social system, and are considered a subset of research in the general field of communication, Although a number of studies have been undertaken in medicine, and, in the past decade, numerous ones in education, there have been few studies on the process of change in nursing. Yet, nursing has undergone tremendous changes in the past 10 years - the nursing process has been introduced, there is the expanded role of the nurse which is rapidly becoming a regular mode of practice - and many, many more changes, We seem to be always running to try. to keep up with changes that have already taken place. Yet little is known about known about the process of change itself - how practitioners learn about new ideas and techniques, or about the factors which influence nurses to accept some changes and reject others. The purpose of the study I am about. to describe was to analyze the process of change as it functioned in regard to nursing innovations in a selected segment of Canadian hospitals, and to relate the analysis to general research and theory about information transmission and the acceptance of change. Three aspects of the process were investigated : 1. The flow of information about changes in nursing practice through a network of hospitals. 2. Factors influencing the adoption of changes in nursing practice. 3. Factors influencing delay in the adoption process, the rejection of changes, or their discontinuance following adoption.

  • PDF

A Study on the Transaction Security of Electronic Payment (전자결제의 보안성에 관한 연구)

  • 홍선의
    • The Journal of Information Technology
    • /
    • v.1 no.1
    • /
    • pp.173-188
    • /
    • 1998
  • In this paper we discussed various types of electronic payment schemes that are emerging. Threats vary from malicious hackers attempting to crash a system, to threats to data or transaction integrity. An understanding of the various types of threats can assist a security manager in selecting appropriate cost-effective controls to protect valuable information resources. An overview of many of today's common threats presented in this paper will be useful to mangers studying their own threat environments with a view toward developing solutions specific to their organization. To ensure security on the Internet, several methods have been developed and deployed. They include authentication of users and servers, encryption, and data integrity. Transaction security is critical : without it, information transmitted over the Internet is susceptible to fraud and other misuse. So computer systems represents an Intermediary with the potential to access the flow of information between a user. Security is needed to ensure that intermediaries cannot eavesdrop on transactions, or copy/modify data. Online firms must take additional precautions to prevent security breaches. To protect consumer information, they must maintain physical security of their servers and control access to software passwords and private keys. Techniques such as secret and public-key encryption and digital signatures play a crucial role in developing consumer confidence in electronic commerce.

  • PDF

A Study on Digital Space Design Method and System using Virtual Reality (가상현실을 활용한 디지털 공간 디자인 기법과 체계 연구)

  • 김연정
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.255-262
    • /
    • 2004
  • The history of design has been closely related with the development of technology. The digital revolution requires design to be as innovative and inventive as the Industrial Revolution had been. In the current society demanding innovation and a new role for design, a successful result can be obtained in the interrelationship between digital and physical environments. In this point of view, exhibition design as a part of space design has had the method of analogue virtual reality, which induces spectators' experiences by creating a virtual environment, as its main expression means before digital technology was introduced. This method was developed from plane images or models to picture techniques according to the development of media technology. Nowadays, the exhibition method introducing multimedia, which enables interactions, is being developed. The main purpose of this study is to identify the meaning and role of virtual space in the view of space design and to analyze its functional interaction. Through this, it attempts to actively promote organic integration and development of widely used cyber space and traditional space design.

  • PDF